Joined: 12 May 2004
|Posted: Mon Nov 20, 2006 9:26 pm Post subject: [ GLSA 200611-11 ] TikiWiki: Multiple vulnerabilities
|Gentoo Linux Security Advisory
Title: TikiWiki: Multiple vulnerabilities (GLSA 200611-11)
Date: November 20, 2006
TikiWiki allows for the disclosure of MySQL database authentication
credentials and for cross-site scripting attacks.
TikiWiki is an open source content management system written in PHP.
Vulnerable: < 1.9.6
Unaffected: >= 1.9.6
Architectures: All supported architectures
In numerous files TikiWiki provides an empty sort_mode parameter,
causing TikiWiki to display additional information, including database
authentication credentials, in certain error messages. TikiWiki also
improperly sanitizes the "url" request variable sent to
An attacker could cause a database error in various pages of a TikiWiki
instance by providing an empty sort_mode request variable, and gain
unauthorized access to credentials of the MySQL databases used by
TikiWiki. An attacker could also entice a user to browse to a specially
crafted URL that could run scripts in the scope of the user's browser.
There is no known workaround at this time.
All TikiWiki users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.6"
Last edited by GLSA on Mon Jan 20, 2014 10:44 am; edited 6 times in total